Search
Now showing items 21-30 of 175
On Feasibility Of Fingerprinting Wireless Sensor Nodes Using Physical Properties
(Computer Science & Engineering, 2012-07-25)
Fingerprinting wireless devices using physical properties has been recently suggested as an alternative for device identification and authentication. It has been found that the clock skew caused by the frequency discrepancy ...
A Source Code Search Engine For Keyword Based Structural Relationship Search
(Computer Science & Engineering, 2013-07-22)
In an Object Oriented Program, we often see that a package contains several classes, a class contains several methods, a method calls other methods. We may say, there is a contains relationship between a package and a class ...
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
(Computer Science & Engineering, 2013-03-20)
Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ...
Learning Partially Observable Markov Decision Processes Using Abstract Actions
(Computer Science & Engineering, 2014-03-10)
Transfer learning and Abstraction are among the new and most interesting research topics in AI and address the use of learned knowledge to improve learning performance in subsequent tasks. While there has been significant ...
Development And Simulation Of Focus Of Attention Using Reinforcement Learning And Function Approximation
(Computer Science & Engineering, 2013-10-22)
Without short-term memory, people would have little hope to learn and accomplish tasks. The same can be said for artificially intelligent agents. Often referred as Miller's Law, the number of working objects that a human ...
Shaping And Maintenance Of Low-latency Anonymity Systems
(Computer Science & Engineering, 2013-03-20)
Surveillance of users on the Internet is growing. This makes it increasingly important to protect users' identity when they communicate online, especially for users like journalists, whistleblowers, and military officials. ...
Implementation Of A Middleware Architecture For Collaboration Among Mobile Devices In Opportunistic Networks.
(Computer Science & Engineering, 2013-03-20)
Opportunistic networks provide a viable platform for mobile communications due to the ubiquity of smart phones. These networks are characterized by lack of end to-end reliable connections. In such networks, establishing ...
Pushpop: A Card Game
(Computer Science & Engineering, 2012-07-25)
In this thesis we have designed and implemented an Android card game called PushPop. This game is meant to stimulate the interest of kids in math learning. The Android game has cards with mathematical signs instead of the ...
Delay Tolerant Lazy Release Consistency For Distributed Shared Memory In Opportunistic Networks
(Computer Science & Engineering, 2011-10-11)
Opportunistic networking (ON), a concept which allows a mobile wireless device to dynamically interact with other wireless devices in its immediate vicinity, is a field with great potential to improve the utility of itinerant ...
Choices And Consequences: A Game-based Risky Behavior Prevention Program
(Computer Science & Engineering, 2012-07-25)
Serious games have been defined as a mental contest played with a computer in accordance to specific rules that use entertainment to further government or corporate training, education, health, public policy and strategic ...